Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CABrd9SSJXuqwq6dm6dTKpXGcGy7inV7Ya2PU6JXw4ft_qFXijQ@mail.gmail.com>
Date: Wed, 11 May 2016 17:18:46 +0100
From: Ben Laurie <benl@...gle.com>
To: oss-security@...ts.openwall.com
Subject: Re: broken RSA keys

On 5 May 2016 at 10:23, Hanno Böck <hanno@...eck.de> wrote:
> As a background: What we're talking about is a so-called batch-gcd
> attack, developed by DJB. Arjen Lenstra and Nadia Heninger were as far
> as I know the first ones to use this on publicly available keysets in
> order to find vulnerable keys.

FWIW, it was actually me and Mathias Bauer in 2004 (which may also
pre-date DJB's development, I don't know - certainly we didn't get the
idea from him, it was Mathias'). We looked at the PGP keyserver data,
but we didn't find anything very interesting, which is probably why
most people don't know it.

To be entirely fair, we did pairwise GCDs, which comes to the same
thing, but less efficiently...

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.